General

  • Target

    3b044b2d711eb6706d0363b1540b5dbeb999341e61c0872fd072c52e402b5691

  • Size

    935KB

  • Sample

    221125-rkzfladc38

  • MD5

    d7626d30f0be45b776a31d6de082fb2f

  • SHA1

    50c89899b01e6bfac6a6ea507442d6a1d988efd9

  • SHA256

    3b044b2d711eb6706d0363b1540b5dbeb999341e61c0872fd072c52e402b5691

  • SHA512

    80c4b12b74baed24a6810cdb60bb6a1bdbae2608b5ed579b1e65b163cb96d8b2f5698fb4ca05a4720e6b6bba67bc256e316130a631f96b8bf5e27ded956184e0

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4L:pyHv5Z+Wzv7AiBll0OBWi6si9G+

Score
8/10
upx

Malware Config

Targets

    • Target

      3b044b2d711eb6706d0363b1540b5dbeb999341e61c0872fd072c52e402b5691

    • Size

      935KB

    • MD5

      d7626d30f0be45b776a31d6de082fb2f

    • SHA1

      50c89899b01e6bfac6a6ea507442d6a1d988efd9

    • SHA256

      3b044b2d711eb6706d0363b1540b5dbeb999341e61c0872fd072c52e402b5691

    • SHA512

      80c4b12b74baed24a6810cdb60bb6a1bdbae2608b5ed579b1e65b163cb96d8b2f5698fb4ca05a4720e6b6bba67bc256e316130a631f96b8bf5e27ded956184e0

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4L:pyHv5Z+Wzv7AiBll0OBWi6si9G+

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks